filmov
tv
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Показать описание
In this talk, we will share reverse engineering results of FaceTime, with a focus on the process of the initialization and connection of a FaceTime call. Along with the attacker-controlled data propagation path, we will discuss different attack surfaces for FaceTime.
By Tao Huang and Tielei Wang
By Tao Huang and Tielei Wang